Citation: | LI Chun hui, CHEN Yi hong. Enhancing the Security of He-Kiesler Signature Schemes[J].JOURNAL OF BEIJING INSTITUTE OF TECHNOLOGY, 2003, 12(3): 326-328. |
[1] |
Shao Z.Signature schemes based on factoring and discrete logarit hms[J].IEE Proc Comput Digit Tech,1999,149(1):33-36.
|
[2] |
Zhang Yufeng,Dai Zongduo.An analysis of t he signature scheme based on two difficult mat hematical problems[J].Communication Security,1999(4):60-65.(inChinese)
|
[3] |
Li Zichen.Analysis of t he key problem in t he signaturescheme[D].Beijing:Department of Information Engineering,Beijing Post and Telecommunication University,1999.(in Chinese)
|
[4] |
Lee N Y.Security of Shao’s signature schemes based onfactoring and discrete logarit hms[J].IEE Proc ComputDigit Tech,1999,149(4):119-121.
|
[5] |
He J,Kiesler T.Enhancing t he security of EL Gamal’ssignature scheme[J].IEE Proc Comput Digit Tech,1994,141(4):249-252.
|
[6] |
Diffie W,Hellman M E.New directions in cryptography[J].IEEE Trans,1976,IT222:644-654.
|